mirror of
https://github.com/public-transport/db-vendo-client.git
synced 2025-02-22 22:59:35 +02:00
dumps
This commit is contained in:
parent
41feb41b5a
commit
232893f2dc
3 changed files with 6 additions and 4 deletions
|
@ -1 +0,0 @@
|
|||
/docs/dumps/
|
|
@ -2,7 +2,9 @@
|
|||
|
||||
In this directory, some intercepted traffic from DB Navigator. (Repo license does not apply to this directory.)
|
||||
|
||||
How to intercept:
|
||||
You can browse some responses of the bahn.de API and others in the [fixtures](https://github.com/public-transport/db-vendo-client/tree/main/test/fixtures) and [e2e fixtures](https://github.com/public-transport/db-vendo-client/tree/main/test/e2e/fixtures).
|
||||
|
||||
How to intercept DB Navigator traffic:
|
||||
|
||||
1. Download/extract Split APK
|
||||
2. Merge APK (e.g. using [APKEditor](https://github.com/REAndroid/APKEditor))
|
||||
|
@ -10,4 +12,4 @@ How to intercept:
|
|||
4. edit [res/xml/network_security_config.xml](https://developer.android.com/privacy-and-security/security-config) to allow user CAs not just in debug
|
||||
5. recompile using apktool, sign
|
||||
6. install on an Android
|
||||
7. intercept with a mitm decryption tool of your choice by installing CA cert into Android store (e.g. PCAPdroid with mitm addon)
|
||||
7. intercept with a mitm decryption tool of your choice by installing CA cert into Android store (e.g. [PCAPdroid](https://github.com/emanuele-f/PCAPdroid) with [mitm addon](https://github.com/emanuele-f/PCAPdroid-mitm), no root needed)
|
||||
|
|
|
@ -13,7 +13,8 @@
|
|||
"parse",
|
||||
"format",
|
||||
"p",
|
||||
"docs"
|
||||
"docs",
|
||||
"!docs/dumps/*"
|
||||
],
|
||||
"author": "Traines <git@traines.eu>",
|
||||
"contributors": [
|
||||
|
|
Loading…
Add table
Reference in a new issue